Sat.Jan 18, 2025 - Fri.Jan 24, 2025

article thumbnail

Don't Get Schooled: Lessons From PowerSchool's Big Breach

Data Breach Today

Why MFA and Data Minimization Remain Key for Preventing Massive Data Breaches While PowerSchool's investigation into the massive theft of its customers' data is continuing, clear lessons have already emerged. Count among them the importance of using multifactor authentication, which could have safeguarded access to PowerSchool's exploited customer support systems.

article thumbnail

Subaru Security Flaws Exposed Its System for Tracking Millions of Cars

WIRED Threat Level

Now-fixed web bugs allowed hackers to remotely unlock and start millions of Subarus. More disturbingly, they could also access at least a year of cars location historiesand Subaru employees still can.

IT 320
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

OpenAI Launches AI Agent 'Operator'

Data Breach Today

Operator Cannot Yet Reliably Perform Complex, Customized Tasks OpenAI introduced an AI agent capable of independent action with the launch of Operator, an general-purpose AI tool that interacts with websites to perform tasks. The agent can navigate menus and complete forms to do tasks such as travel booking, ordering takeout, buying stuff or scheduling tasks.

147
147
article thumbnail

Phishing Campaign Attempts to Bypass iOS Protections

KnowBe4

An SMS phishing (smishing) campaign is attempting to trick Apple device users into disabling measures designed to protect them against malicious links, BleepingComputer reports.

Phishing 126
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

A flaw in the W3 Total Cache plugin exposes hundreds of thousands of WordPress sites to attacks

Security Affairs

A WordPress W3 Total Cache plugin vulnerability could allow attackers to access information from internal services, including metadata on cloud-based apps. A severe vulnerability, tracked as CVE-2024-12365 (CVSS score of 8.5) in the WordPress W3 Total Cache plugin could expose metadata from internal services and cloud apps. The WordPress W3 Total Cache plugin is a popular performance optimization tool designed to improve the speed and efficiency of WordPress websites.

Metadata 311

More Trending

article thumbnail

How to Get Around the US TikTok Ban

WIRED Threat Level

TikTok is now unavailable in the United Statesand getting around the ban isnt as simple as using a VPN. Heres what you need to know.

Privacy 215
article thumbnail

Biden Signs New Cybersecurity Order

Schneier on Security

President Biden has signed a new cybersecurity order. It has a bunch of provisions, most notably using the US governments procurement power to improve cybersecurity practices industry-wide. Some details : The core of the executive order is an array of mandates for protecting government networks based on lessons learned from recent major incidents—namely, the security failures of federal contractors.

article thumbnail

Esperts found new DoNot Team APT group’s Android malware

Security Affairs

Researchers linked the threat actor DoNot Teamto a new Android malware that was employed in highly targeted cyber attacks. CYFIRMA researchers linked a recently discovered Android malware to the Indian APT group known as DoNot Team. The Donot Team (aka APT-C-35 and Origami Elephant) has been active since 2016, it focuses ongovernment and military organizations, ministries of foreign affairs, and embassies in India, Pakistan, Sri Lanka, Bangladesh, and other South Asian countries.

Military 284
article thumbnail

Malvertising Campaign Abuses Google Ads to Target Advertisers

KnowBe4

Researchers at Malwarebytes are tracking a major malvertising campaign thats abusing Google Ads to target individuals and businesses interested in advertising.

Phishing 119
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

How to set up God Mode in Windows 11 - and the wonders you can do with it

Collaboration 2.0

God Mode provides easy access to an array of Windows settings from one single window. Here's how it works.

IT 347
article thumbnail

Moss on AI Disruption: 'Everything, Everywhere, All at Once'

Data Breach Today

The pace of change including the rise of artificial intelligence and a sense of accelerating chaos can make cybersecurity professionals feel like "things are kind of everything, everywhere, all at once," said Black Hat conference founder Jeff Moss. How should they respond?

article thumbnail

J-magic malware campaign targets Juniper routers

Security Affairs

Threat actors are targeting Juniper routers with a custom backdoor in a campaign called code-named “J-magic,” attackers are exploiting a Magic Packet flaw. Lumen Technologies researchers reported that the J-magic campaign targets Juniper routers with a custom backdoor using a passive agent based on the cd00r variant (an open-source backdoor by fx ).

article thumbnail

US Names One of the Hackers Allegedly Behind Massive Salt Typhoon Breaches

WIRED Threat Level

Plus: New details emerge about Chinas cyber espionage against the US, the FBI remotely uninstalls malware on 4,200 US devices, and victims of the PowerSchool edtech breach reveal what hackers stole.

Security 159
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

The top 10 brands exploited in phishing attacks - and how to protect yourself

Collaboration 2.0

Impersonating a well-known brand is an easy way for scammers to get people to click their malicious links. Here's what to watch for.

Phishing 336
article thumbnail

Breach Roundup: Researchers Find Flaws in Palo Alto Firewalls

Data Breach Today

Also: US Prosecutors Charge Suspected North Korean IT Worker Collaborators This week, researchers spied Palo Alto firewall flaws, a North Korean IT worker conspiracy, ChatGPT as DDoS vector. Chinese hackers targeted a VPN maker, a fake PyPi package and a Russian threat actor shifted tactics. BreachForums admin faces prison and scammers used the release of Ross Ulbricht.

IT 173
article thumbnail

Malicious npm and PyPI target Solana Private keys to steal funds from victims’ wallets

Security Affairs

Researchers found malicious npm and PyPI packages capable of stealing and deleting sensitive data from infected systems. Socket researchers have identified multiple packages in the npm and Python Package Index (PyPI) repository designed to target Solana private keys and drain funds from victims’ wallets. The malicious npm packages allowed the threat actors to exfiltrate Solana private keys via Gmail.

Libraries 253
article thumbnail

HHS Office for Civil Rights Proposes Measures to Strengthen Cybersecurity in Health Care Under HIPAA

Thales Cloud Protection & Licensing

HHS Office for Civil Rights Proposes Measures to Strengthen Cybersecurity in Health Care Under HIPAA madhav Thu, 01/23/2025 - 06:25 Data Breaches in Healthcare: Why Stronger Regulations Matter A data breach involving personal health information isnt just about stolen filesits a gut punch to trust and a serious shake-up to peoples lives. Think about it: sharing your deepest, most personal health concerns, only to have them spilled out into the world because of a cyberattack.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Microsoft is forcing Windows 11 24H2 update on all eligible PCs, but is it stable enough?

Collaboration 2.0

Computers running the Home and Pro flavors of Windows 11 23H2 and 22H2 will gradually be updated, whether you like it or not.

IT 321
article thumbnail

CISA Warns of Flaws in Aircraft Collision Avoidance Systems

Data Breach Today

Hackers Unlikley to Exploit Flaws in The Wild Security researchers found an unpatchable flaw in the system that prevents commercial aircraft from crashing into each other, the U.S.

article thumbnail

Two ransomware groups abuse Microsoft’s Office 365 platform to gain access to target organizations

Security Affairs

Two ransomware groups exploiting Microsoft 365 services and default settings to target internal enterprise users. Sophos researchers started investigating two distinct clusters of activity, tracked as STAC5143 and STAC5777, in response to customer ransomware attacks in November and December 2024. Threat actors used their own Microsoft 365 tenants and exploited a default Teams setting allowing external users to contact internal users for attacks.

article thumbnail

Digitize supply chains to get ahead of possible disruptions

OpenText Information Management

Economists predict businesses will have little choice but to pass the cost of proposed tariffs on to customers for anything from clothing, food, automobiles, energy, and more. Enterprise businesses may be able to absorb some of tariff-related costs to limit their impact, but small to mid-sized businesses risk losing customers altogether if prices spike too high too fast even despite easing inflation.

B2B 59
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

How ChatGPT solved an Ancestry DNA mystery for me and my long-lost cousin

Collaboration 2.0

Even though we share just 1% of our DNA, my third cousin and I used AI to connect the dots between generations. Here's how and what we learned.

321
321
article thumbnail

Amazon Details Measures to Counter S3 Encryption Hacks

Data Breach Today

Hackers Using Valid Customer Credentials to Re-Encrypt S3 Objects Amazon is urging its customers to deploy additional security measures to secure S3 buckets following reports of ransomware attacks targeting the platform. The company said mitigations prevented "a high percentage of attempts from succeeding.

article thumbnail

U.S. CISA adds SonicWall SMA1000 flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds SonicWall SMA1000 vulnerability to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a SonicWall SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC) vulnerability, tracked as CVE-2025-23006 to its Known Exploited Vulnerabilities (KEV) catalog.

IT 242
article thumbnail

Energy insights from Davos 2025 – safeguarding the planet

OpenText Information Management

As global leaders converge at Davos for the World Economic Forum 2025, safeguarding our planet is one of five key themes in this years forum. The theme explores, how can we catalyze energy, climate and nature action through innovative partnerships, increased financing and the deployment of frontier technologies. I see this theme very much encompassing the information management software technology domain as one of those frontier technology areas.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

4 surprise products we could see at Samsung Unpacked 2025 - and are worth getting excited about

Collaboration 2.0

The Galaxy S25 series is slated to be announced on Wednesday, but we may also get surprise appearances on the wearables side.

316
316
article thumbnail

Information Security Career Advice: 'Pick Your Battles'

Data Breach Today

With the pace of global change so often creating a sense of accelerating chaos, it's easy to view cyber defenders as firefighters constantly on call. But Black Hat conference founder and creator Jeff Moss warned that "things have been on fire for as long as I can remember.

article thumbnail

SonicWall warns of a critical CVE-2025-23006 zero-day likely exploited in the wild

Security Affairs

SonicWall warns customers of a critical zero-day vulnerability in SMA 1000 Series appliances, likely exploited in the wild. SonicWall is waring customers of a critical security vulnerability, tracked as CVE-2025-23006 (CVSS score of 9,8) impacting its Secure Mobile Access (SMA) 1000 Series appliances. The vulnerability is a Pre-authentication deserialization of untrusted data issue in the SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC) that has been likely exploit